Displaying 1-10 of 10 results

Extracting knowledge from large amount of data while preserving the sensitive information is an important issue in data mining. Providing security to sensitive data against unauthorized access has been a long term goal for the database security research community. Almost all the research in privacy preservation is limited to binary...

Most of the familiar protocols use single server for storing all the needed information to authenticate a user. Maintenance of security is of primary importance in any computing environment. Safe and effective authentication mechanism and evaluation methods of the entity are of utmost importance for the grid users to facilitate...

Searching an optimal solution for route finding is one of the major functions in GIS. It also provides a strong decision support for finding the optimal route for specified rural area. Here GIS which is referred as data warehouse in which abundant resource are available. This paper mainly analyses the...

The performance degradation of TCP in wireless and wired-wireless hybrid networks is mostly due to lack of its ability to differentiate the packet losses caused by network congestions from the wireless transmission losses. In IEEE 802.16 networks, wireless loss can occur due to wireless link errors and when the number...

This paper presents a new blind approach of image Steganalysis based on contourlet transform and non linear support vector machine. Properties of Contourlet transform are used to extract features of images, and non linear support vector machine is used to classify the stego and cover images. The important aspect of...

A Wireless Sensor Network (WSN) is an aggregation of sensor nodes, distributed in an environment, to sense and collect information. A typical WSN consists of low-cost, low-power, and energy-constrained sensors responsible for monitoring a physical phenomenon and reporting to access points where the end-user can access the data. The open...

Data mining aims at extracting hidden information from data. Data mining poses a threat to information privacy. Privacy preserving data mining hides the sensitive rules and prevents the data from being disclosed to the public. Attribute reduction techniques reduce the dimensionality of dataset. Rough sets are used for attribute reduction...

Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (SHA-192). It uses a famous secure hash algorithm given by the National Institute of Standard and Technology (NIST).The basic...

Distribution loads vary in response to temperature, time of the day, day of the week and other factors such as humidity precipitation and season. The effects of daily load patterns of a typical Low Voltage network (LV network) need to be studied in depth for optimization. This requires a detailed...

In group communication scenario, key management is important to preserve forward and backward secrecy. In order to achieve it keys need to be changed during user join/leave which is done by an operation called rekeying. In a centralized key management scheme, the server thereafter passes the new keys to the...

This paper presents a new blind approach of image Steganalysis based on contourlet transform and non linear support vector machine. Properties of Contourlet transform are used to extract features of images, and non linear support vector machine is used to classify the stego and cover images. The important aspect of...

Distribution loads vary in response to temperature, time of the day, day of the week and other factors such as humidity precipitation and season. The effects of daily load patterns of a typical Low Voltage network (LV network) need to be studied in depth for optimization. This requires a detailed...

The performance degradation of TCP in wireless and wired-wireless hybrid networks is mostly due to lack of its ability to differentiate the packet losses caused by network congestions from the wireless transmission losses. In IEEE 802.16 networks, wireless loss can occur due to wireless link errors and when the number...

In group communication scenario, key management is important to preserve forward and backward secrecy. In order to achieve it keys need to be changed during user join/leave which is done by an operation called rekeying. In a centralized key management scheme, the server thereafter passes the new keys to the...

A Wireless Sensor Network (WSN) is an aggregation of sensor nodes, distributed in an environment, to sense and collect information. A typical WSN consists of low-cost, low-power, and energy-constrained sensors responsible for monitoring a physical phenomenon and reporting to access points where the end-user can access the data. The open...

Data mining aims at extracting hidden information from data. Data mining poses a threat to information privacy. Privacy preserving data mining hides the sensitive rules and prevents the data from being disclosed to the public. Attribute reduction techniques reduce the dimensionality of dataset. Rough sets are used for attribute reduction...

Searching an optimal solution for route finding is one of the major functions in GIS. It also provides a strong decision support for finding the optimal route for specified rural area. Here GIS which is referred as data warehouse in which abundant resource are available. This paper mainly analyses the...

Most of the familiar protocols use single server for storing all the needed information to authenticate a user. Maintenance of security is of primary importance in any computing environment. Safe and effective authentication mechanism and evaluation methods of the entity are of utmost importance for the grid users to facilitate...

Extracting knowledge from large amount of data while preserving the sensitive information is an important issue in data mining. Providing security to sensitive data against unauthorized access has been a long term goal for the database security research community. Almost all the research in privacy preservation is limited to binary...

Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (SHA-192). It uses a famous secure hash algorithm given by the National Institute of Standard and Technology (NIST).The basic...

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?